mthbernardes / QMKhuehuebr
Trying to hack into keyboards
☆86Updated 6 years ago
Alternatives and similar repositories for QMKhuehuebr
Users that are interested in QMKhuehuebr are comparing it to the libraries listed below
Sorting:
- A shellcode testing harness.☆69Updated 10 months ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Red Team Resources☆60Updated 6 years ago
- ☆122Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆24Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- My OSCP report template in LaTex☆25Updated 5 years ago
- ☆13Updated 7 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago